« List of all CVEs

CVE-2023-39193

Kernel: netfilter: xtables sctp out-of-bounds read in match_flags()

Published: 10/9/2023 Last updated: 11/6/2025 Reserved: 7/25/2023

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 6.1 Medium CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L

Opam packages affected (29)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes ortools_solvers orun rawlink rawlink-eio rawlink-lwt restricted shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (12)

Product Vendor Version
Red Hat Enterprise Linux 6 Red Hat <= 6.10.*
Red Hat Enterprise Linux 7 Red Hat <= 6.1.*
Red Hat Enterprise Linux 9 Red Hat <= 9.1.8
Red Hat Enterprise Linux 9 Red Hat <= 9.2.2
Red Hat Enterprise Linux 8 Red Hat <= 8.19.8
Red Hat Enterprise Linux 8 Red Hat <= 5.10.*
Red Hat Enterprise Linux 9 Red Hat <= 6.6.*
Red Hat Enterprise Linux 9 Red Hat <= 5.15.*
Red Hat Enterprise Linux 9 Red Hat <= 6.6.*
Red Hat Enterprise Linux 8 Red Hat <= 6.1.*
Red Hat Enterprise Linux 7 Red Hat <= 6.11.*
Red Hat Enterprise Linux 8 Red Hat <= 7.17.29

References (26)